2016
DOI: 10.1109/access.2016.2569421
|View full text |Cite
|
Sign up to set email alerts
|

A Review of Compressive Sensing in Information Security Field

Abstract: The applications of compressive sensing (CS) in the field of information security have captured a great deal of researchers' attention in the past decade. To supply guidance for researchers from a comprehensive perspective, this paper, for the first time, reviews CS in information security field from two aspects: theoretical security and application security. Moreover, the CS applied in image cipher is one of the most widespread applications, as its characteristics of dimensional reduction and random projectio… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
54
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
7
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 169 publications
(54 citation statements)
references
References 125 publications
0
54
0
Order By: Relevance
“…The CS technique can also be applied in database systems [22], where random noise has been intentionally added to CS measurements for differential privacy. In practice, a variety of CS-based cryptosystems concerning the security of multimedia, imaging, and smart grid data have been suggested in [23][29].…”
Section: Introductionmentioning
confidence: 99%
“…The CS technique can also be applied in database systems [22], where random noise has been intentionally added to CS measurements for differential privacy. In practice, a variety of CS-based cryptosystems concerning the security of multimedia, imaging, and smart grid data have been suggested in [23][29].…”
Section: Introductionmentioning
confidence: 99%
“…Compressive sensing (CS) is the technique that compressively samples and reconstructs signals from fewer measurements, in order to reduce the cost of signal transmission and storage [19][20][21][22][23]. The signal x can be compressively sampled by a sensing matrix expressed as: where y ∈ R m is the measurements and ∈ R m×n with m < n. When x denotes the vectorization of an image patch, its sparse representation in terms of the dictionary D ∈ R n×q can be written as:…”
Section: Applied To Compressive Sensingmentioning
confidence: 99%
“…For instance, CSbased MRI imaging [9] or radar monitoring systems [10], [11] have been able to significantly reduce the signal acquisition time and bandwidth requirements over traditional approaches. In addition to data acquisition advantage, CS is inherently cryptographic [12], [13] since CS signals are linearly sampled using random measurement matrices. CS-based encryption runs thus in parallel with the data acquisition and is a lowcost solution compared to well-known complex encryption standards such as AES or RSA.…”
Section: Introductionmentioning
confidence: 99%